Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 16:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t.n.nejm.org/r/?id=t81f11efa,7ff2ec4,3976002&cid=DM2333137_Non_Subscriber&bid=-2114904326&p1=%40VsOlMHe4fx8AGiO%2FfSI5obPdukUYchO8Vs71Ijeg8CQ%3D
Resource
win10v2004-20240226-en
General
-
Target
https://t.n.nejm.org/r/?id=t81f11efa,7ff2ec4,3976002&cid=DM2333137_Non_Subscriber&bid=-2114904326&p1=%40VsOlMHe4fx8AGiO%2FfSI5obPdukUYchO8Vs71Ijeg8CQ%3D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133559445445828025" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2584 chrome.exe 2584 chrome.exe 3820 chrome.exe 3820 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe Token: SeShutdownPrivilege 2584 chrome.exe Token: SeCreatePagefilePrivilege 2584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe 2584 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2028 2584 chrome.exe 88 PID 2584 wrote to memory of 2028 2584 chrome.exe 88 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2792 2584 chrome.exe 90 PID 2584 wrote to memory of 2988 2584 chrome.exe 91 PID 2584 wrote to memory of 2988 2584 chrome.exe 91 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92 PID 2584 wrote to memory of 1080 2584 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://t.n.nejm.org/r/?id=t81f11efa,7ff2ec4,3976002&cid=DM2333137_Non_Subscriber&bid=-2114904326&p1=%40VsOlMHe4fx8AGiO%2FfSI5obPdukUYchO8Vs71Ijeg8CQ%3D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe08db9758,0x7ffe08db9768,0x7ffe08db97782⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:22⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:82⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:12⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:82⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:82⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4996 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3152 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:12⤵PID:5820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1904,i,13146695204032306634,9394593418595186614,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD516fc34bc61b95ba2351576444c4b8836
SHA1f95142e97a2847a0157c5a92765542b1f718b2de
SHA25686a88f7ef6d44047f8b853cb5a87f744f662e3505e48546b178a8bd1da861bbc
SHA51237bc0719c8c1ccdba82ebdc3e010590d9aa7ce79185eb55278867607ad3deed6f4b48697ab5b34e3a302348658d5e252a4fa63df23730dff0fe0751f695ad6ed
-
Filesize
3KB
MD571e31772dc61f6d39235ae3c5c7e1a00
SHA1c67f39b4f5b515c657cf64ff01e0d6936c74fedf
SHA256832493e3b0cc8c8b8ab22080732dc771a4764a09f612d8b40d96b07f2c54c236
SHA512dc7e977650e4aae86aef72dcd3cca4e8fc484397494ada06945a8998d6dfb2d24066599bf288130cf2e10b45216c2d76b7fa4462d5e0aa30b578767bf0fa6183
-
Filesize
706B
MD5ce88a7bb23787bb1e0f82fef8aeccc3c
SHA1395453b5e9dab58c8bb4b8dbf720f81452cff4a2
SHA2564c316e7aa3a065706f7ec13d3ba8493d81e0405ce1ceddf40655e95e1d45fecf
SHA512f61d59e0f469e08ceb6105b8c3157dbf1165860c83ba7bf6c03053206ae6cd6ba5eed5c0bbc863e3e484e714e97d765ef26aa4b833575106d7604aa9cffd65d4
-
Filesize
2KB
MD5f7952afba5637d0d93cff9c6d4352248
SHA1da8a24dc39cb51038824dd7e3baf8da53b02e1f2
SHA25678aa7d9a2d193c7feaf6954bc9e86990513dcead8883b42c183be72baf30e840
SHA512e5a6d7d17568a0af280fa949558752255a6e0371a3667506dd37bb43ac2ebf3eb444639930940b7e72fca174198cc64a300d6398f9150f9f37edb7576838b441
-
Filesize
6KB
MD55fc4aaccb2b5247f2fd14cffe418cf3e
SHA138afe07308518d0dbb049843b735a341a8414aa6
SHA2561b4644faad1e1454932fb1b24557af5a481cb4d47699b2142b11434fb1eaf47a
SHA5126dd27ebc11ce9a3d696136fcbffdd950b409f457b9629d70868498e0e6b14b54f17971115178a93384571ae4e8a98151bb24c0de29cb570881d99095cfb7796d
-
Filesize
6KB
MD50ae827dd9906f1f333534a9d7be27081
SHA137c1810b63f09b9c95fa0adca2a3da01af8e8d84
SHA2565b04fb214dc0e2906aff055d6c9127f1076bcc329d68940ef97fb832c2cf6346
SHA512c01332cd8e341699cb2926f61d8ba5f14758c34126a3739a6ea937197e76a0d9368a447e9228beaaca76aec54a3bd213910336293f19e7538009bc1f7b69e920
-
Filesize
128KB
MD58a9d4d2f08108a3b8d95f5f74916727b
SHA1819c61fb0d46c9988d9735de7dd5282c0d5c2cb0
SHA256d60d0f40c00c787069ea83997a55e14b63de02e74cd19fb60018865900066804
SHA512dda7253bc9870efa1a875e9ef5d45ef5b3fbf655a229073e1fe75ae881aaf89375e35a9122b8e14e65bc95d7572ab7e17fbaec634ff814695ac9380fac34895f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd